咨询与建议

限定检索结果

文献类型

  • 1,473 篇 会议
  • 1,220 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,895 篇 工学
    • 1,465 篇 计算机科学与技术...
    • 1,180 篇 软件工程
    • 317 篇 信息与通信工程
    • 273 篇 控制科学与工程
    • 154 篇 生物工程
    • 134 篇 机械工程
    • 133 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 92 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 39 篇 安全科学与工程
    • 39 篇 网络空间安全
    • 37 篇 建筑学
  • 893 篇 理学
    • 552 篇 数学
    • 184 篇 物理学
    • 172 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 546 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 75 篇 医学
    • 65 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 49 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 38 篇 feature extracti...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 cloud computing
  • 29 篇 deep learning

机构

  • 507 篇 state key labora...
  • 202 篇 department of co...
  • 151 篇 department of co...
  • 118 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 63 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 49 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 37 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...
  • 27 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 21 篇 gao yang
  • 21 篇 lu sanglu
  • 21 篇 xu xiaolong

语言

  • 2,524 篇 英文
  • 90 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2701 条 记 录,以下是41-50 订阅
排序:
A quantum federated learning framework for classical clients
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第5期67卷 1-10页
作者: Yanqi Song Yusen Wu Shengyao Wu Dandan Li Qiaoyan Wen Sujuan Qin Fei Gao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 00876China Department of Physics The University of Western AustraliaPerthWA 6009Australia School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China
Quantum federated learning(QFL)enables collaborative training of a quantum machine learning(QML)model among multiple clients possessing quantum computing capabilities,without the need to share their respective local *... 详细信息
来源: 评论
Dual Cross-Stage Partial Learning for Detecting Objects in Dehazed Images  24
Dual Cross-Stage Partial Learning for Detecting Objects in D...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhao, Jinbiao Zhang, Zhao Ren, Jiahuan Zhang, Haijun Zhao, Zhongqiu Wang, Meng School of Computer Science and Information Engineering Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Yunan China Harbin Institute of Technology Department of Computer Science Shenzhen China
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
FCA-based θ-iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Computer Science and Engineering Soonchunhyang University Asan31538 Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos... 详细信息
来源: 评论
Color Image Steganalysis Algorithm Based on Quaternion Convolutional Neural Network  30th
Color Image Steganalysis Algorithm Based on Quaternion Convo...
收藏 引用
30th International Conference on Computational and Experimental Engineering and sciences, ICCES 2024
作者: Xu, Meng Wang, Jinwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Most of the images on the Internet are color images, and steganalysis of color images is a very critical issue in the field of steganalysis. The current proposed color image steganalysis features mainly rely on manual... 详细信息
来源: 评论
Reward Maximization for Disaster Zone Monitoring with Heterogeneous UAVs
收藏 引用
IEEE/ACM Transactions on Networking 2024年 第1期32卷 890-903页
作者: Xu, Wenzheng Wang, Chengxi Xie, Hongbin Liang, Weifa Dai, Haipeng Xu, Zichuan Wang, Ziming Guo, Bing Das, Sajal K. Sichuan University College of Computer Science Chengdu610065 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong Nanjing University Department of Computer Science and Technology Nanjing210023 China Dalian University of Technology School of Software Dalian116024 China Sichuan University Key Laboratory of Birth Defects and Related Maternal and Child Diseases West China Second Hospital College of Computer Science Chengdu610066 China Missouri University of Science and Technology Department of Computer Science RollaMO65409 United States
In this paper, we study the deployment of K heterogeneous UAVs to monitor Points of Interest (PoIs) in a disaster zone, where a PoI may represent a school building or an office building, in which people are trapped. A... 详细信息
来源: 评论
Speech Recognition Method Based on Deep Learning of Artificial Intelligence: An example of BLSTM-CTC model  2023
Speech Recognition Method Based on Deep Learning of Artifici...
收藏 引用
5th International Symposium on Signal Processing Systems, SSPS 2023
作者: Chen, Kangyu Peng, Zhiyuan Department of Computer Science The University of Hong Kong Hong Kong State Key Laboratory for Novel Software Technology Nanjing University China
Under the influence of information, network and intelligent high-speed development situation, China's intelligent technology and other aspects have made great progress and achievements, derived a lot of advanced a... 详细信息
来源: 评论
GridDroid--An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface
收藏 引用
Journal of computer science & technology 2022年 第1期37卷 147-181页
作者: Jun Ma Qing-Wei Sun Chang Xu Xian-Ping Tao State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Huatai Securities Co. Ltd.Nanjing 210019China
Repackaging brings serious threats to Android *** birthmark techniques are typically applied to detect repackaged *** based on apps'runtime graphical user interfaces(GUI)are effective,especially for obfuscated or ... 详细信息
来源: 评论
On the Fine-Grained Query Complexity of Symmetric Functions  34
On the Fine-Grained Query Complexity of Symmetric Functions
收藏 引用
34th International Symposium on Algorithms and Computation, ISAAC 2023
作者: Podder, Supartha Yao, Penghui Ye, Zekun Department of Computer Science Stony Brook University New YorkNY United States State Key Laboratory for Novel Software Technology Nanjing University China Hefei National Laboratory China State Key Laboratory for Novel Software Technology Nanjing University China
Watrous conjectured that the randomized and quantum query complexities of symmetric functions are polynomially equivalent, which was resolved by Ambainis and Aaronson [1], and was later improved in [15, 12]. This pape... 详细信息
来源: 评论
Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach  40
Joint Mobile Edge Caching and Pricing: A Mean-Field Game App...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Xu, Yin Zhang, Xichong Xiao, Mingjun Wu, Jie Liu, An Zhang, Sheng School of Computer Science and Technology University of Science and Technology of China Hefei China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou China Temple University Department of Computer and Information Sciences Philadelphia United States School of Computer Science and Technology Soochow University Suzhou China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable pr... 详细信息
来源: 评论